Critical Information Studies
4,830 Followers
Recent papers in Critical Information Studies
Various thinkers have dealt over the years with the influence of technology on how humans find their place in the world (Habermas 2003; Heidegger [1953] 2008; [1953] 1996). The technological developments of recent times have great... more
As part of a continuum of Native, Indigenous, and Aboriginal resistance, digital projects and repositories offer platforms to reckon with settler representations of space and peoples. Two projects, Mapping Indigenous Los Angeles (MILA)... more
The contemporary Critical Legal Research (“CLR”) project exhibits much diverse and vital thought. However, this Essay draws, in particular, on CLR strains in the explicit Marxist- and socialist-steeped traditions. Such a CLR framework... more
Plagiarism is a folk devil into which is poured many of the challenges, problems and difficulties confronting higher education. This article investigates how software -Turnitin in particular-is 'solving' a particular 'crisis' in... more
From Ancient Times to the Present Day, writers have remarked on the unique power of music to evoke emotions, signal identity, and bond or divide entire societies, all without the benefit of literal representation. According to Aram... more
Comment s’informait-on des affaires du temps aux XVIe et XVIIe siècles ? Ce livre explore les multiples dimensions de l’information en étudiant comment les données collectées sur le terrain des guerres ottomanes étaient transmises, reçues... more
Every two weeks, a language becomes extinct with its last speaker (Strochlic 2018). With the current attempt of preserving and revitalizing endangered languages, tech giants like Microsoft have been at the forefront to tackle this issue... more
A temptative circumscription of 'the care of any archive' with reference to Stiegler's approach of technics as the pharmakon of 'the gap between the book and the book' (Derrida). Paper proposal.
The US Army Future Combat Systems is a large-scale procurement program that will introduce a number of ‘manned’ and ‘unmanned’ platforms all of which will be completely interconnected into one layered network. Hailed as revolutionary, all... more
The main goal of this paper is to conceptualize a seeping commodification . Author claims we are in the midst of a considerable qualitative transformation in the processes of commodification that is, in large part, owed to an overwhelming... more
This book documents the first life-cycle of the Post-Media Lab (2011-2014). Taking up Fèlix Guattari’s challenge, the Lab aimed to combine social and media practices into collective assemblages of enunciation in order to confront social... more
This book documents the first life-cycle of the Post-Media Lab (2011-2014). Taking up Fèlix Guattari’s challenge, the Lab aimed to combine social and media practices into collective assemblages of enunciation in order to confront social... more
The paper proposes a critical approach to information systems definition, design, and development (ISD) grounded in discourse theory, semiotics, practical philosophy and critical systems thinking. It aims to support IS researchers and... more
DNS amplification attacks massively exploit open recursive DNS servers mainly for performing bandwidth consumption DDoS attacks. The amplification effect lies in the fact that DNS response messages may be substantially larger than DNS... more
This paper argues that the current military program of transformation can be understood as both an institutional and a systemic adaptation to the increasing emphasis being placed upon the network form. Increasingly important to the... more
One of the main objectives of this research paper is to map the security landscape of cloud computing systems and services running on Critical Infrastructures. In fulfilling this aim, first the cloud architecture will be laid out to... more
A comparative review of Jonathan Sterne's MP3 and Matthew Fuller and Andrew Goffey's Evil Media.
We present in this paper the use of a security mechanism to handle the protection of network security components, such as Firewalls and Intrusion Detection Systems. Our approach consists of a kernel-based access control method which... more
Review of How We Became Our Data: A Genealogy of the Informational Person by Colin Koopman, Chicago, IL: University of Chicago Press, 2019, 272 pages, $30.00 paperback (ISBN: 9780226626581)
This book documents the f irst life-cycle of the Post-Media Lab (2011-2014). Taking up Fèlix Guattari's challenge, the Lab aimed to combine social and media practices into collective assemblages of enunciation in order to confront social... more
We present a novel Intrusion Detection System able to detect complex attacks to SCADA systems. By complex attack, we mean a set of commands (carried in Modbus packets) that, while licit when considered in isolation on a single-packet... more
We present in this paper the use of a security mechanism to handle the protection of network security components, such as Firewalls and Intrusion Detection Systems. Our approach consists of a kernel-based access control method which... more
*La version française suit* *Please circulate widely*/*Excuse cross-posting* We are pleased to announce the Call for Proposals (CFP) for CAPAL15: Academic Librarianship and Critical Practice, the second annual conference of the... more
Inter-dependency evaluation through quantitative approaches is one of the open challenges in Critical Infrastructure Protection. The incapability to conduct appropriate networks inter-dependencies measurements undermines the possibility... more
This book documents the f irst life-cycle of the Post-Media Lab (2011-2014). Taking up Fèlix Guattari’s challenge, the Lab aimed to combine social and media practices into collective assemblages of enunciation in order to confront social... more
This book documents the first life-cycle of the Post-Media Lab (2011-2014). Taking up Fèlix Guattari’s challenge, the Lab aimed to combine social and media practices into collective assemblages of enunciation in order to confront social... more
This book documents the first life-cycle of the Post-Media Lab (2011-2014). Taking up Fèlix Guattari’s challenge, the Lab aimed to combine social and media practices into collective assemblages of enunciation in order to confront social... more
... Although many models have been developed to study particular contexts and single infrastruc-ture sectors, a global strategy to represent and manage the complex is-sue of infrastructure dependency has not been deployed yet. ... 2.1 A... more
The Collaborative for Historical Information and Analysis (CHIA), a large-scale digital humanities project, aims to link world-historical data in the social sciences, natural sciences, and humanities; allow researchers to draw new... more
DNS amplification attacks massively exploit open recursive DNS servers mainly for performing bandwidth consumption DDoS attacks. The amplification effect lies in the fact that DNS response messages may be substantially larger than DNS... more
Google has become a central object of study for digital media scholars due to the power and impact wielded by the necessity to begin most engagements with social media via a search process, and the near-universality with which Google has... more